monitoring for insider threats

jimd

Network Security: Using Dashboards to Aid Your Investigation

In my last post, titled Network Visibility: Using Dashboards to Tell a Deeper Story, we discussed how the dashboard feature of Scrutinizer can be an asset to multiple departments. I’ve had the opportunity to work with clients who had a one- or two-person shop and some who had multiple departments. There has been one common …

Network Security: Using Dashboards to Aid Your Investigation Read More »

jimd

Network Visibility: Using Dashboards to Tell a Deeper Story

When it comes to network traffic monitoring, a single and unified view of your networking infrastructure is essential in ensuring that your environment is correctly watched over. It’s common to have hundreds, if not thousands, of routing and optimizing devices in today’s global networks. This tends to make monitoring things like traffic load, application usage, …

Network Visibility: Using Dashboards to Tell a Deeper Story Read More »

jimd

Three Strategies to Catch and Stop Insider Threats

Earlier this year I worked on a document that addressed some of the common misconceptions about Scrutinizer. One of the subjects that caught my attention was Scrutinizer’s ability to mitigate insider threats. Honestly, I really wanted to dig deeper on all the subjects on my list, but the marketing team frowned on me passing along …

Three Strategies to Catch and Stop Insider Threats Read More »